Advances in Computer Systems Architecture: 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004. ProceedingsAuthor: Pen-Chung Yew, Jingling Xue Published by Springer Berlin Heidelberg ISBN: 978-3-540-23003-8 DOI: 10.1007/b100354Table of Contents:Some Real Observations on Virtual Machines Replica Victim Caching to Improve Reliability of In-Cache Replication Efficient Victim Mechanism on Sector Cache Organization Cache Behavior Analysis of a Compiler-Assisted Cache... Topic: Computer architecture
byChen, Kefei, 1959-; Xiao, G. (Guozhen), 1934-; International Workshop on Progress on Cryptography (2004 : Shanghai, China)
Progress on Cryptography: 25 Years of Cryptography in ChinaAuthor: Kefei Chen Published by Springer US ISBN: 978-1-4020-7986-3 DOI: 10.1007/b116807Table of Contents:Randomness and Discrepancy Transforms Legendre Sequences and Modified Jacobi Sequences Resilient Functions with Good Cryptographic Properties Differential Factoring for Integers Simple and Efficient Systematic a-Codes from Error Correcting Codes On Coefficients of Binary Expression of Integer Sums A New Publicly Verifiable Proxy... Topics: Computer security, Cryptography
byColmenarez, Antonio J. (Antonio José); Xiong, Ziyou; Huang, Thomas S., 1936-
Facial Analysis from Continuous Video with Applications to Human-Computer InterfaceAuthor: Antonio J. Colmenarez, Ziyou Xiong, Thomas S. Huang Published by Springer US ISBN: 978-1-4020-7802-6 DOI: 10.1007/b101848Table of Contents:Introduction Information-based Maximum Discrimination Face and Facial Feature Detection Face and Facial Feature Tracking Face and Facial Expression Recognition 3-D Model-based Image Communication Implementations, Experiments and Results Application in an Audio-visual... Topics: Human-computer interaction, Image processing, Computer vision
Coding, Cryptography and CombinatoricsAuthor: Keqin Feng, Harald Niederreiter, Chaoping Xing Published by Birkhäuser Basel ISBN: 978-3-0348-9602-3 DOI: 10.1007/978-3-0348-7865-4Table of Contents:On the Secondary Constructions of Resilient and Bent Functions Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes Modularity of Asymptotically Optimal Towers of Function Fields A New Correlation Attack on LFSR Sequences with High Error Tolerance LDPC... Topics: Computer science, Data structures (Computer science), Coding theory, Combinatorial analysis, Coding...
Packaging of High Power Semiconductor LasersAuthor: Xingsheng Liu, Wei Zhao, Lingling Xiong, Hui Liu Published by Springer New York ISBN: 978-1-4614-9262-7 DOI: 10.1007/978-1-4614-9263-4Table of Contents:Introduction of High Power Semiconductor Lasers Overview of High Power Semiconductor Laser Packages Thermal Design and Management in High Power Semiconductor Laser Packaging Thermal Stress in High Power Semiconductor Lasers Optical Design and Beam Shaping in High Power Semiconductor Lasers... Topics: Energy, Energy Systems
Astronomy Across Cultures: The History of Non-Western AstronomyAuthor: Helaine Selin, Sun Xiaochun Published by Springer Netherlands ISBN: 978-94-010-5820-9 DOI: 10.1007/978-94-011-4179-6Table of Contents:Sky Tales and Why We Tell Them Astronomy and Prehistory Astronomy and the Dreaming: The Astronomy of the Aboriginal Australians Useful and Conceptual Astronomy in Ancient Hawaii Ancient Astronomical Monuments in Polynesia A Polynesian Astronomical Perspective: The Maori of New Zealand The... Topics: Physics, History, Regional planning, History, Physics, Regional planning
Dear infowriting staff: Attached in a new internet booklet complete with title page that literally spells out the "lies" of the capitalist megamatrix. ( Please see the cover graphic ) " The full decoding of President Barack [Hussein] Obama concerning the international capitalist class's agenda for more war, a global prison state, and "New World Order" based on decades of lies, finance fraud, and brutality. Humor is often the best medicine.... " It contains some of... Topics: Worldwide Political Deceptions, WPD, Obama 2010, Mass Political Deceptions, Obama 2011, Obama, 2012
Lisa Harper Interview 1-12-2012 with Jesse Stevens of Hometown Family Radio talking about the upcoming womens winter retreat to be held on Jan. 28th 2012 at the McCook City Auditorium Topic: Lisa Harper Interview 1-12-2012
A three chapter manga comic, about the exploration of a mansion.Released for free sharing under a Creative Commons Attribution-Non Commercial-No Derivatives licence. Topics: hetaoni, manga, cc, byncnd, by-nc-nd, comic
Gene TherapyAuthor: Kleanthis G. Xanthopoulos Published by Springer Berlin Heidelberg ISBN: 978-3-642-72162-5 DOI: 10.1007/978-3-642-72160-1Table of Contents:A Few Glances at the Function of Chromatin and Nuclear Higher-Order Structure in Transcription Regulation Transcriptional Regulation and Gene Expression in the Liver Modeling Genetic Diseases in the Mouse The Use of Genetic Switches for the Generation of Conditional Mutants at the Level of Cells and Animals Application of Tetracycline... Topics: Medicine, Human genetics, Oncology, Cytology, Cytology, Human genetics, Medicine, Oncology
Software vulnerabilities are security threats that exist in an appli-cation and may enable users to exercise unauthorized control of theprogram through supplied input. Unauthorized control of an appli-cation may be gained using techniques such as buffer overflow, SQLinjection, cross site scripting, etc. Checking for software vulnera-bilities in the context of web applications has become extremelyimportant as businesses observe an increasing reliance on web ap-plications. This paper presents a... Topics: dynamic taint analysis, program analysis, PHP, Java, Servlets, Quercus PHP interpreter
Software security vulnerabilities are a major threat for software systems. In the worst case, vulnerabilities in software enable users to gain unauthorized access or unauthorized control of an application. A large amount of software security vulnerability exploits such as buffer overflows, SQL injections, cross-site scripting attacks, etc. are caused by data flowing from untrusted program input sources into sensible program functions. We define a tainted path as a program execution path from an... Topics: static analysis, software security, taint analysis, c++, llvm, Xavier NOUMBISSI NOUNDOU, program...
Otolaryngology (ENT) Sacramento, CAPhysician-in-Chief / Director, The Permanente Medical Group, Board of Directors, Oakland, CA SUMMARY Professional Background “I joined Kaiser Permanente in 1995 and have Advanced Certification in Head and Neck Oncologic Surgery. My specialties include: orbital, nasal, and maxillofacial surgery, as well as thyroid and parathyroid surgery. I function as a regional resource for the management of advanced tumors of the head and neck and provide the... Topics: Dr. Richard Isaacs, Richard Isaacs MD
Gibson & Associates are specialists in Insurance Law/Arbitration, Personal Injury Compensation Law, Insolvency Law and Immigration. As a well-established firm of Solicitors we have a vast amount of experience in a wide range of cases in our particular areas of expertise. The firm has a strong reputation for delivering high quality advice and excellent results for clients.Daireann GibsonDaireann is the Managing Solicitor of Gibson & Associates and also advises on a wide range of... Topics: about us, expert legal help for you across ireland, gibson and associates solicitors
Xenophon's Anabasis, or March Up Country, translated from Greek by H. G. Dakyns (New York, 1890). Xenophon (B.C. 431-354), a general and student of Socrates, led an army of 10,000 Greek mercenaries to Babylon to aid the Persian Cyrus, who was trying to seize the throne from Shah Artaxerxes (B.C. 405-359). Cyrus was defeated and died, leaving Xenophon stranded. He was obliged to lead his soldiers back home through hostile territory (between 401 B.C. and March 399 B.C.). The route he took was... Topics: Xenophon, Greek Antiquities, Ancient History, Ancient Asia Minor, Syria, Mesopotamia, Armenia,...
Xenophon's Cyropaedia, or Life of Cyrus, Translated from Greek by Henry Graham Dakyns, revised by F. M. Stawell. Xenophon (B.C. 431-354), a general and student of Socrates, wrote this historical romance using information about Cyrus the Great of Persia (ca. B.C. 559-530) as a vehicle for describing his own conception of an ideal state. Although not accurate history as is the Anabasis--Xenophon's other historical work about the East--this gem contains some probably accurate historical details... favoritefavoritefavoritefavorite ( 1 reviews ) Topics: Xenophon, Literature, Historical, Romance, Persia, Persian, Iran, Iranian, Cyrus the Great, Asia...
Theresa Montierros Film Review The Heat Despite coming out the same year as another movie with more or less exactly the same plot (Megamind), 2010's Despicable Me felt like a breath of fresh air in a family-friendly CGI film landscape dominated by sassy animals and talking cars. The sequel can't quite replicate that sense of discovery but should satisfy the young target audience. Reformed supervillain Gru (voiced in a broad European accent by comedy superstar Steve Carell) has settled into his... favoritefavoritefavoritefavoritefavorite ( 6 reviews ) Topic: Theresa Montierros Film Review The Heat
Preservation and exhibition project at New Museum July 17- September 8, 2013. Wiring diagrams and equipment specifications for video preservation stations 1 and 2, (U-Matic, BetacamSP, VHS, MiniDV, DVCAM, Hi8) Topics: New Museum, XFR STN, XFRSTN, video, preservation, digitization, diagrams, umatic, vhs, visual,...
byXianbing Liu, Leina Wang, Yanli Dong, Jie Yang, Cunkuan Bao
This paper describes case studies on green supply chain management (GSCM) of three companies based in the Yangtze River delta of China. After clarifying major supply chain relationships of each company, we identified their internal and external GSCM practices. The corresponding changes of environmental and economic performances are summarized quantitatively or in a narrative manner. The case studies confirm that the multinational and foreign-funded companies have more active GSCM practices than... Topics: Green supply chain management, case study, China
In this note, we present a simple approach to calculate the time of blowing up along the curve and surface contracting flow. Our approach dependents on the famous theorem of turning tangents, Gauss-Bonnet Theorem and Willmore Theorem. We also prove that the rotation index of a closed curve and the Euler characteristic of a closed surface are constants along the curve and surface contracting flow. Topics: curve contracting flow, surface contracting flow
From Personal Digital Archiving 2015, hosted by NYU’s Moving Image Archiving and Preservation (MIAP) program, in collaboration with NYU Libraries and Coalition for Networked Information (CNI). Topics: PDA, 2015, PDA 2015, Personal Digital Archiving 2015, Besser, Ubois, NYU, MIAP, CNI, Cliff Lynch,...
byXIAO BING ILLUSTRATED BY LU YANGUANG AND CHEN WANZIANG
CHINESE CHILDREN'S BOOK IN ENGLISH, KIDS LITERATURE, FICTION, ILLUSTRATED BOOK, CHINESE, BEGINNING SCIENCE Topics: CHINESE CHILDREN'S BOOK IN ENGLISH, KIDS LITERATURE, FICTION, ILLUSTRATED BOOK, CHINESE
The behavior of flow between two coaxial frustum cones, with the inner one rotating and the outer stationary, is studied in this paper. It is found that the fluid at the outlet does not flow out directly, but flows up till a certain height. This reflux generates a vortex area with a quite large velocity and pressure magnitude. This reflux area, between Z/H = 0.05 and 0.30, has the trend to move up with increasing Reynolds number Re. The velocity magnitude is linear in the radial direction if... Topics: Frustum cone, Reynolds number, Stability, Vortex
Global approximation substitute for the original model is also called response surface (RS), surrogate or meta-model. The key aspects should be considered when using the RS approximation method: the accuracy of the RS, the number of original model evaluations, the time consuming when updating the RS, the memory space occupied by the RS, and the speed of evaluation for a given point using the RS. This paper analyzes the drawbacks of the existing response surface methods, and then proposes an... Topics: global approximation, polynomial response surface
The electrochemical method is a promising technology for aclean environmental and is widely applied in the control ofwastewater pollution, especially in the removal of metal andoxidation of refractory organics. The heavy metal wastewatertreated by the electrochemical method is reviewed in thisliterature. The key and challenges of the application of theelectrochemical method in the control of heavy metalwastewater are pointed out. Topics: Electrochemical Oxidation, Heavy Metal, Cyanide, Complex Metal, Organic Pollutants, Wastewater
Computing System Reliability: Models and AnalysisAuthor: Min Xie, Yuan-Shun Dai, Kim-Leng Poh Published by Springer US ISBN: 978-0-306-48496-4 DOI: 10.1007/b100619Table of Contents:Introduction Basic Reliability Concepts and Analysis Models for Hardware System Reliability Models for Software Reliability Models for Integrated Systems Availability and Reliability of Distributed Computing Systems Reliability of Grid Computing Systems Multi-state System Reliability Optimal System Design and... Topic: Electronic digital computers
This paper analyzes the characteristics of the assembly line production system of Virtual Enterprises, and proposes production structure model of assembly line based on the optimization techniques of time superposition. The model considers the regional distribution of Virtual Enterprises and the resulting of transportation costs, stock costs and processing costs of the time constraint,and proposes the optimization scheme based on genetic algorithm. The results of experiment showed that this... Topics: Streaming-flow Production, Virtual Enterprises, Process Planning.
Saints And Servants Of God SeriesCONTENTS. BOOK I. CHAPTER I. The birth of the Blessed Sebastian, and his life at home 3 II. The Blessed Sebastian leaves his home and arrives at Salamanca: what befel him there 7 III. The Blessed Sebastian leaves Salamanca and goes to San Lucar of Barrameda 11 IV. Arrival of the Blessed Sebastian in San Lucar, and his stay there 14 V. The Blessed Sebastian resolves to cross over to the West Indies: his voyage thither 19 VI. Arrival of the Blessed Sebastian in... Topics: Christian Saints -- Biography, Saints And Servants Of God, Aparicio, Sebastián de, Saint,...
In this paper, electromagnetic wave absorption principle of water vapour molecules in atmosphere has been analyzed. As a result, the molecular electromagnetic wave absorption formula of water vapour has been established. The absorption-transmitted spectrum calculated from this formula is well agreement with atmospheric window. Consequently, the conclusion is deduced that the water vapour in atmosphere make the main contribution to the absorption of electromagnetic wave and the molecular... Topics: electromagnetic wave, molecular
In this paper, the classic rule of combination in the Dezert-Smarandache theory is found to be not convergent with the number increase of evidential sources since it leaves out the denominator in the Dempster’s rule. That is, it is a process of entropy productions. This means the final result of combination is more uncertain, and can not give a good decision. Several illustrative examples are given to explain and testify this problem. Finally, a conclusion is given, in order to point out the... Topics: evidence reasoning, Dezert-Smarandache theory, combinational rule, belief function theory
In this paper, the classic rule of combination in the Dezert-Smarandache theory is found to be not convergent with the number increase of evidential sources since it leaves out the denominator in the Dempster ’s rule. That is, it is a process of entropy productions. This means the final result of combination is more uncer tain, and can not give a good decision. Several illustrative examples are given to explain and testify this problem. Finally, a conclusion is given, in order to point out... Topics: evidence reasoning, Dezert-Smarandache theory, combinational rule, belief function theory
There is a major impact on the market due to the arrangements of different enterprises of cooperation and innovation of the business model innovation performance and competitive position. In the process of innovation, cooperation should consider various factors in the selection of an appropriate model and innovation. In fact, a particular enterprise does not only use the innovative approach, which is often a combination of various methods. For example, certain technologies through market... Topics: Cooperative innovation, Enterprise, Model
In this paper we investigated on the essential composite elements of E-Business in a view of complex, marketability, internationalization perspective, and clarified the demand characteristics for various kind of E-Business professional in the different phases with the rapid evolution of E-Business in our country. Basing on the background of International Business School, with the innovative ideas of paying more attention to the basis, extending the special learning scope, emphasizing the... Topics: E-Business, Eessential Composition Elements, Market
byXORKO Collaborative Arts Movement and Various Artists
Poetry-Photography compilation that was compiled after an open call for submissions, published in January of 2015 (in a hundred copies) and first presented in the two day event "Producing localities: Cultural Endeavours, towards a Cypriot paradigm" (2-3/01/15) by XORKO Collaborative Arts Movement. Topics: Cypriot poetry, poetry, Cypriot photography, Cypriot art, Cyprus, XORKO, XORKO Collaborative Arts...
Extreme Programming and Agile Processes in Software Engineering: 5th International Conference, XP 2004, Garmisch-Partenkirchen, Germany, June 6-10, 2004. ProceedingsAuthor: Jutta Eckstein, Hubert Baumeister Published by Springer Berlin Heidelberg ISBN: 978-3-540-22137-1 DOI: 10.1007/b98150Table of Contents:The Video Store Revisited Yet Again: Adventures in GUI Acceptance Testing Test Driving Custom Putting a Motor on the Canoo WebTest Acceptance Testing Framework Generative Acceptance Testing... Topics: Agile software development, eXtreme programming
Extreme Programming and Agile Methods - XP/Agile Universe 2004: 4th Conference on Extreme Programming and Agile Methods, Calgary, Canada, August 15-18, 2004. ProceedingsAuthor: Carmen Zannier, Hakan Erdogmus, Lowell Lindstrom Published by Springer Berlin Heidelberg ISBN: 978-3-540-22839-4 DOI: 10.1007/b99820Table of Contents:Combining Formal Specifications with Test Driven Development Long Build Trouble Shooting Guide Acceptance Testing vs. Unit Testing: A Developer’s Perspective The Role of... Topics: Agile software development, eXtreme programming, Logiciels, Programmation extrême, Agile software...
"This story is pretty old. I wrote it in December 2011. I was doing some experiments in fanfic and I thought it would be funny to do some work with Link and Zelda in the world of Hyrule, which I had some familiarity with. The main reason I played video games when I was a sapling was because of the images they put in my head and the situations I would concoct from those images after I was done playing the game. This story is one of those situations." Topics: zelda, mario, nintendo 64, fan fiction